We now have a fossil of a squid eating a crustacean while it is being eaten by a shark. As usual, you can also use this squid post to talk...
Read moreFBI/AFP-Run Encrypted Phone
June 11 2021For three years, the Federal Bureau of Investigation and the Australian Federal Police owned and operated a commercial encrypted phone app, called AN0M, that was used by organized crime...
Read moreDetecting Deepfake Picture Editing
June 10 2021
“Markpainting” is a clever technique to watermark photos in such a way that makes it easier to detect ML-based manipulation:
An image owner can modify their image in subtle...
Read more
Information Flows and Democracy
June 9 2021
Henry Farrell and I published a paper on fixing American democracy: “Rechanneling Beliefs: How Information Flows Hinder or Help Democracy.”
It’s much easier for democratic stability to break down...
Read more
Vulnerabilities in Weapons Systems
June 8 2021
“If you think any of these systems are going to work as expected in wartime, you’re fooling yourself.”
That was Bruce’s response at a conference hosted by US Transportation Command...
Read moreThe Supreme Court Narrowed the CFAA
June 7 2021
In a 6-3 ruling, the Supreme Court just narrowed the scope of the Computer Fraud and Abuse Act:
In a ruling delivered today, the court sided with Van...
Read more
Friday Squid Blogging: Squids in Space
June 4 2021NASA is sending baby bobtail squid into space. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...
Read moreSecurity and Human Behavior (SHB) 2021
June 4 2021
Today is the second day of the fourteenth Workshop on Security and Human Behavior. The University of Cambridge is the host, but we’re all on Zoom.
SHB is a...
Read moreThe DarkSide Ransomware Gang
June 2 2021
The New York Times has a long story on the DarkSide ransomware gang.
A glimpse into DarkSide’s secret communications in the months leading up to the Colonial Pipeline attack...
Read more
Recent Comments